Professional Documents
Culture Documents
1 ___ is a fraudulent Wi-Fi access point that appears to be legitimate but is set up to eavesdrop on
wireless communications.
◯ IP spoofing ◯ SSID ◯ An evil twin ◯ traffic control
2 Wardriving is the act of searching for Wi-Fi wireless networks, usually from a moving vehicle, using
a laptop or smartphone.
◯ True ◯ False
4 Legacy telecommunications technologies do not rely on physical media such as cables or fiber
optics.
◯ True ◯ False
6 The presence of documentation that allows a transaction to be traced through all stages of
information processing is called ...
◯ Computer virus ◯ Cyber Law ◯ Ergonomics
◯ xxx Audit trail ◯ Antivirus software
7 Sending extremely critical, derogatory, and vulgar e-mail messages is called ...
◯ hacking ◯ Flaming ◯ blaming ◯ cracking
8 Interconnected networks need communications processors such as switches, routers, hubs, and
gateways. These are examples of ...
◯ Client/server networks ◯ Digital ◯ Inter-network processors
◯ Peer-to-peer networks ◯ TCP/IP
9 Warcrusing is the act of searching for Wi-Fi wireless networks, usually from a moving vehicle, using
a laptop or smartphone.
◯ True ◯ False
1 Security appliance (e.g. Cisco ASA) is a unified threat management device, combining several
0 network security functions in one box.
◯ True ◯ False
Bonus: Draw the diagram on the back of this page- “how public key encryption works”.
Chosen Organization:
Business role:
Chosen Organization: